-
-
Notifications
You must be signed in to change notification settings - Fork 4k
feat(voice)!: add new encryption methods, remove old methods #10451
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎ 2 Skipped Deployments
|
47606c3
to
4879a69
Compare
when #10472 is ready i will update tests for this (tweetnacl is being swapped out for stablelib & jest utterly hates it) |
52469d5
to
846b594
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #10451 +/- ##
==========================================
- Coverage 38.17% 38.14% -0.03%
==========================================
Files 239 239
Lines 15495 15578 +83
Branches 1369 1376 +7
==========================================
+ Hits 5915 5943 +28
- Misses 9565 9620 +55
Partials 15 15
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a small nit of mine, otherwise this looks good.
Thank you for this PR. 🙇
Please describe the changes this PR makes and why it should be merged:
Added the new encryption methods that Discord will enforce for all voice users in November. Since the older methods are being deprecated entirely, I am removing them as well. Because tweetnacl does not support the cipher methods necessary for xchacha, I have removed it and replaced it with @stablelib/xchacha20poly1305 (aes256gcm does not require anything other than node:crypto, so that could theoretically be the only one needed if the vc always requested that)
Testing has been added for the encryption methods aswell, and I have changed some older tests to properly remove the RTP header based on the original encrypted data.
Status and versioning classification: